Alice is using the public-key authentication protocol of Fig. 8-43 to authenticate communication with Bob. However, when sending message 7, Alice forgot to encrypt RB. Trudy now knows the value of RB. Do Alice and Bob need to repeat the authentication procedure with new parameters in order to ensure secure communication? Explain your answer.
Figure 8-43.Mutual authentication using public-key cryptography.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here